Allied Telesis 86241-02 manual Features

Page 2

2

Patch Release Note

Features in 86241-02

Patch 86241-02 includes all issues resolved and enhancements released in previous patches for Software Release 2.4.1, and the following enhancements:

PCR: 02103

Module: SWI

Network affecting: No

IPX traffic passing between two switch instances using VLAN for Rapier48 now operates correctly.

PCR: 02210

Module: DNS Relay

Network affecting: No

Buffer leaks occurred when DNS relay was enabled. This issue has been resolved.

PCR: 02214

Module: IPG

Network affecting: No

A buffer leak occurred when a large number of flows (over 4000) were in use and needed to be recycled. This issue has been resolved.

PCR: 02220

Module: SWI

Network affecting: No

The EPORT parameter in the ADD SWITCH L3FILTER ENTRY and SET SWITCH L3FILTER ENTRY commands was matching multicast and broadcast packets with software filtering. This issue has been resolved.

PCR: 02236

Module: FIREWALL

Network affecting: No

Sometimes the retransmission of an FTP packet was not permitted through the Firewall. This issue has been resolved.

PCR: 02245

Module: VRRP

Network affecting: No

VRRP returned an incorrect MAC address for an ARP request. This issue has been resolved.

PCR: 02263

Module: VRRP

Network affecting: No

The virtual MAC address was used as the source MAC for all packets forwarded on an interface associated with a Virtual Router (VR). This was confusing when multiple VRs were defined over the same interface because only one virtual MAC address was ever used. The other virtual MAC addresses (for the other VR's) were only used if the source IP address matched the VR’s IP address. To avoid this confusion, the system MAC address is now always used unless the source IP address of the packet is the same as the VR’s IP address.

PCR: 02267

Module: BGP

Network affecting: No

When route aggregation was enabled, the atomic aggregate was not being set. This issue has been resolved.

PCR: 02268

Module: FIREWALL

Network affecting: No

HTTP requests from a fixed IP address were erroneously reported as a host scan attack in the Firewall deny queue. This issue has been resolved.

Patch 86241-02 for Software Release 2.4.1 C613-10340-00 REV B

Image 2
Contents Introduction Features PCR 02277 Module Dvmrp Network affecting No PCR Module IPG, PIM, SWI Network affecting NoPCR Module Tpad Network affecting No PCR Module TELNET, TTY Network affecting NoPCR Module STP Network affecting No PCR Module Install Network affecting NoPCR Module IPv6 Network affecting No PCR Module IPG, ETH Network affecting No PCR Module FR Network affecting NoPCR Module IPG/FIREWALL Network affecting No PCR Module Classifier Network affecting NoPCR Module SCC, SYN, PPP Network affecting No PCR 02346 Module BGP, IPGNetwork affecting NoPCR 02348 Module Enco Network affecting No PCR Module FFS, FILE, TTY Network affecting NoPCR 02376 Module PPPNetwork affecting No PCR 02369 Module IPGNetwork affecting NoPCR 02371 Module FIREWALLNetwork affecting No PCR 02378 Module SWINetwork affecting NoPCR Module IPG Network affecting No Module Vrrp PCR Module Trace Network affecting NoPCR Module SNMP, CORE, SHOW, Network affecting No PCR 02457 Module IPV6Network affecting No PCR 02450 Module IPV6Network affecting NoPCR 02452 Module IPv6Network affecting No PCR 02463 Module DVMRP, IPG Network affecting NoPCR Module Switch Network affecting No Availability PCR Module DHCP, IPG Network affecting NoPatch Release Note